TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted drive. On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password or correct encryption key. Until decrypted, a TrueCrypt volume appears to be nothing more than a series of random numbers. The entire file system is encrypted (i.e., file names, folder names, contents of every file, and free space).

This software is highly recommended for securing data on laptops.

TrueCrypt performs the following tasks:

* Creates a virtual encrypted disk within a file and mounts it as a real disk.
* Encrypts an entire partition or storage device such as USB flash drive or hard drive.
* Encrypts a partition or drive where Windows is installed (pre-boot authentication).
* Encryption is automatic, real-time (on-the-fly) and transparent.
* Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data).
* Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS.

This open-source encryption program is loaded with powerful encryption features, but a lack of in-program help may dissuade all but those users who definitely need or want to completely secure their data. A powerhouse of potential, TrueCrypt offers 11 algorithms for encrypting your private files in a password-protected volume. You can store your encrypted data in files (containers) or partitions (devices). TrueCrypt works hard to offer powerful data protection, recommending complex passwords, explaining the benefits of hidden volumes, and erasing telltale signs of the encryption process, including mouse movements and keystrokes. Though the interface may not be immediately intuitive, its powerful, on-the-fly encryption for no cost still earns the freeware security tool a top rating.

The useful tips in the extensive help manual and volume-creation wizard provide excellent guidance. In fact, they're rather required reading, as TrueCrypt lacks any considerable in-program help. For instance, the tutorial explains the entire concept beyond "hidden" volumes, but it doesn't quite explain how to mount them. One obvious downside of any strong encryption program is if you happen to forget your lengthy, secure password, you should consider any protected files as good as gone. However, once files are mounted to a local drive with your password or key, they conveniently behave just like any normal files, allowing you to easily open, copy, delete, or other modify them. Dismount the volume, and voila--your previously accessible files are now safely secure from prying eyes.

****************************************************************

****************************************************************

Change Log

Bug fixes:

* Writing to a TrueCrypt volume under Linux no longer causes the system to stop responding under certain conditions.
* Occasional application errors no longer occur when selecting a file (Windows XP SP2 issue).
* Fixed bug that caused installation of the TrueCrypt driver to fail under certain configurations of 64-bit Windows.
* TrueCrypt volumes mounted in a remote session under Windows 2000 can now be accessed.
* TrueCrypt Volume Creation Wizard no longer blocks hot keys of certain applications. (Windows)
* Other minor bug fixes (Windows and Linux)

Improvements:

* It will not be required to reinstall the TrueCrypt kernel module after every minor Linux kernel update.
* Support for latest Linux kernel (2.6.17)
* Other minor improvements (Windows and Linux)

Security improvements:

* The Linux version of TrueCrypt now uses the TrueCrypt Random Number Generator (ported from the Windows version of TrueCrypt) instead of using only the Linux built-in random number generator. (This change was necessary due to a flaw in the Linux built-in random number generator: Data from the mouse and keyboard, which are the most important sources of random data, are not read by the Linux built-in random number generator when the user has only a USB mouse/keyboard.)
Note: The Linux version of TrueCrypt still uses the Linux built-in random number generator. However, it is now merely one of the data sources used by the TrueCrypt random number generator.
* Interactive mount mode, which allows the user to avoid passing sensitive parameters via command line. (Linux)
* TrueCrypt volume is unmapped if mounting it to a directory fails. (Linux)
* When the Never Save History option is enabled, TrueCrypt sets its current directory to the users home directory (in traveller mode, to the directory from which TrueCrypt was launched) after a container or keyfile is selected via the Windows file selector. Therefore, the Windows file selector will not remember the path of the last selected container or keyfile. (Windows)